Laser drilling is capable of producing small, precisely positioned holes with high degree of reproductively. In this paper , IR millisecond Nd:YAG single pulsed laser was used to determine the effect of laser parameters on the drilled hole of the glass - fiber reinforced epoxy composite FR-4 sample of 2 mm in thickness . The type of laser source was GSI lumonics JK760TR Series laser 1.064μm system in a CNC cabin. The JK760TR series has a 0.3-50ms pulse length and a maximum repetition rate 500Hz with an average power of 600W. The investigation of single pulse laser drilling in this paper was based on theoretical and experimental solutions. In single pulse technique, the investigation included focal plane position fpp, pulse shape, laser peak power, and pulse duration. It was found that (-1) was the best fpp due to less taper for the drilled holes made by this level (Entrance hole =0.68, Exit hole = 0.27). To predict pulse shape effects; three types were : rectangular , rump-up and cool down, it were examined found that rectangular pulse was efficient more than the other types due to its ability to produce holes with less tapering as compared with others types. Also its found that all pulse shapes had the same effect on the materials microstructure . Laser peak power and pulse duration had the predominant affects on the hole dimensions and edge quality without any defect except hole tapering.
The consumption of dried bananas has increased because they contain essential nutrients. In order to preserve bananas for a longer period, a drying process is carried out, which makes them a light snack that does not spoil quickly. On the other hand, machine learning algorithms can be used to predict the sweetness of dried bananas. The article aimed to study the effect of different drying times (6, 8, and 10 hours) using an air dryer on some physical and chemical characteristics of bananas, including CIE-L*a*b, water content, carbohydrates, and sweetness. Also predicting the sweetness of dried bananas based on the CIE-L*a*b ratios using machine learn- ing algorithms RF, SVM, LDA, KNN, and CART. The results showed that increasing the drying
... Show MoreRapid worldwide urbanization and drastic population growth have increased the demand for new road construction, which will cause a substantial amount of natural resources such as aggregates to be consumed. The use of recycled concrete aggregate could be one of the possible ways to offset the aggregate shortage problem and reduce environmental pollution. This paper reports an experimental study of unbound granular material using recycled concrete aggregate for pavement subbase construction. Five percentages of recycled concrete aggregate obtained from two different sources with an originally designed compressive strength of 20–30 MPa as well as 31–40 MPa at three particle size levels, i.e., coarse, fine, and extra fine, were test
... Show MoreThis paper analyzes a piled-raft foundation on non-homogeneous soils with variable layer depth percentages. The present work aims to perform a three-dimensional finite element analysis of a piled-raft foundation subjected to vertical load using the PLAXIS 3D software. Parametric analysis was carried out to determine the effect of soil type and initial layer thickness. The parametric study showed that increasing the relative density from 30 % to 80 % of the upper sand layer and the thickness of the first layer has led to an increase in the ultimate load and a decrease in the settlement of piled raft foundations for the cases of sand over weak soil. In clay over weak soil, the ultimate load of the piled raft foundation w
... Show MoreIn this research we been estimated the survival function for data suffer from the disturbances and confusion of Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on the basis of the method of the Cen
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show More